Home
last modified time | relevance | path

Searched refs:kdf (Results 1 – 13 of 13) sorted by relevance

/system/keymaster/
Dkdf_test.cpp32 ForTestAbstractKdf kdf; in TEST() local
35 ASSERT_TRUE(kdf.Init(KM_DIGEST_SHA1, key, 128, salt, 128)); in TEST()
36 ASSERT_TRUE(kdf.Init(KM_DIGEST_SHA_2_256, key, 128, salt, 128)); in TEST()
37 ASSERT_TRUE(kdf.Init(KM_DIGEST_SHA1, key, 128, nullptr, 0)); in TEST()
38 ASSERT_FALSE(kdf.Init(KM_DIGEST_MD5, key, 128, salt, 128)); in TEST()
39 ASSERT_FALSE(kdf.Init(KM_DIGEST_SHA1, nullptr, 0, salt, 128)); in TEST()
40 ASSERT_FALSE(kdf.Init(KM_DIGEST_SHA1, nullptr, 128, salt, 128)); in TEST()
41 ASSERT_FALSE(kdf.Init(KM_DIGEST_SHA1, key, 0, salt, 128)); in TEST()
Decies_kem.cpp45 keymaster_kdf_t kdf; in EciesKem() local
46 if (!authorizations.GetTagValue(TAG_KDF, &kdf)) { in EciesKem()
51 switch (kdf) { in EciesKem()
56 LOG_E("Kdf %d is unsupported", kdf); in EciesKem()
DMakefile96 kdf.cpp \
220 kdf.o \
228 kdf.o \
238 kdf.o \
249 kdf.o \
273 kdf.o \
Dattestation_record.cpp67 ASN1_INTEGER_SET* kdf; member
102 ASN1_EXP_SET_OF_OPT(KM_AUTH_LIST, kdf, ASN1_INTEGER, TAG_KDF.masked_tag()),
296 integer_set = &record->kdf; in build_auth_list()
DAndroid.bp139 "kdf.cpp",
/system/vold/
Dcryptfs.cpp1162 kdf_func kdf, void *kdf_params, in decrypt_master_key_aux() argument
1172 if (kdf(passwd, salt, ikey, kdf_params)) { in decrypt_master_key_aux()
1210 static void get_kdf_func(struct crypt_mnt_ftr *ftr, kdf_func *kdf, void** kdf_params) in get_kdf_func() argument
1213 *kdf = scrypt_keymaster; in get_kdf_func()
1216 *kdf = scrypt; in get_kdf_func()
1219 *kdf = pbkdf2; in get_kdf_func()
1229 kdf_func kdf; in decrypt_master_key() local
1233 get_kdf_func(crypt_ftr, &kdf, &kdf_params); in decrypt_master_key()
1235 decrypted_master_key, kdf, kdf_params, in decrypt_master_key()
/system/tpm/trunks/
Dtpm_utility_impl.cc1701 public_area.parameters.ecc_detail.kdf.scheme = TPM_ALG_NULL; in CreateDefaultPublicArea()
Dtpm_generated.h1317 TPMI_ALG_KDF kdf; member
1447 TPMT_KDF_SCHEME kdf; member
1522 TPMT_KDF_SCHEME kdf; member
Dtpm_generated.cc5158 result = Serialize_TPMI_ALG_KDF(value.kdf, buffer); in Serialize_TPMS_SCHEME_XOR()
5176 result = Parse_TPMI_ALG_KDF(buffer, &value->kdf, value_bytes); in Parse_TPMS_SCHEME_XOR()
6301 result = Serialize_TPMT_KDF_SCHEME(value.kdf, buffer); in Serialize_TPMS_ALGORITHM_DETAIL_ECC()
6364 result = Parse_TPMT_KDF_SCHEME(buffer, &value->kdf, value_bytes); in Parse_TPMS_ALGORITHM_DETAIL_ECC()
6880 result = Serialize_TPMT_KDF_SCHEME(value.kdf, buffer); in Serialize_TPMS_ECC_PARMS()
6908 result = Parse_TPMT_KDF_SCHEME(buffer, &value->kdf, value_bytes); in Parse_TPMS_ECC_PARMS()
/system/tpm/trunks/generator/
Draw_structures.txt12951 kdf
13976 kdf
14719 kdf
14725 If the kdf
Draw_structures_fixed.txt12963 kdf
13991 kdf
14712 kdf
Draw_commands_fixed.txt4249 6) If the key is an ECC key and the KDF required by the curveID is not the same as kdf in the pubic
4255 requires that the kdf in the template be set to TPM_ALG_NULL or TPM_RC_KDF is
Draw_commands.txt4247 6) If the key is an ECC key and the KDF required by the curveID is not the same as kdf in the pubic
4253 requires that the kdf in the template be set to TPM_ALG_NULL or TPM_RC_KDF is